BLOG

2025年7月30日

A Guide to Digital Asset Wallets and Service Providers

Marketing

Cregis

阅读时长 5 分钟

Key Takeaways

  • Learn the differences between custody models: self-custody, sub-custody, and hybrid approaches.
  • Understand the roles of custody technology providers, subcustodians, businesses, and end-users.
  • Explore three critical assessment pillars: identity of custodian, operational resiliency, and counterparty risk.
  • Discover how different wallet types suit varying business use cases—from fintechs to financial institutions.


Introduction: Why Custody Model Choice Matters

As digital assets become a core part of financial and enterprise infrastructure, businesses must choose wallet solutions and service providers that align with their risk tolerance, compliance requirements, and long-term strategy.

Whether you're a fintech startup, a Web3 platform, or a traditional financial institution, understanding custody models and the service providers behind them is essential to maintaining asset control and reducing risk exposure.

This guide offers a foundational framework to help business leaders navigate wallet architecture, evaluate custody models, and select reliable wallet service providers.


Understanding the Wallet Ecosystem: Key Roles and Terminology

Digital asset wallet infrastructure often involves multiple parties, each with distinct responsibilities. Here’s a breakdown of the key terms:

  • Custody Technology Service Provider: Offers software or technology to create, manage, and secure wallets, without necessarily holding assets. Example: Fireblocks
  • Subcustodian: Holds and controls assets on behalf of the business or its users. Often requires licensing and assumes custody responsibilities.
  • Business: Contracts with a custody technology provider or subcustodian to operate digital wallets for treasury management or retail services.
  • End-User: The business's customer. Usually doesn’t have a direct relationship with the wallet provider.

Key Distinction:

  • In a self-custodial setup, the business retains control over wallet keys.
  • In a subcustodial model, control rests with the wallet provider.


Wallet and Custody Models Explained

There are three main types of custody setups:

Custody ModelWallet ControlBest For
Self-CustodyBusinessEnterprises wanting full control
Sub-CustodyService ProviderInstitutions seeking turnkey solutions
Hybrid (Co-Custody)Shared between partiesFintechs balancing control and convenience


Wallet Use Cases by Market Segment

Different businesses require different wallet architectures. Here’s how wallet types align with common use cases:

  • Fintechs & Wallet Apps: Favor hybrid custody for balance between security and user experience.
  • Exchanges & Trading Platforms: Often adopt self-custody with infrastructure providers to retain full control over funds.
  • Traditional Banks & Institutions: Prefer subcustody or regulated third-party custodians due to compliance requirements.


How to Evaluate Wallet Service Providers: 3 Key Factors

To make informed decisions, businesses should assess wallet providers across these three critical areas:

1. Custodian Identity & Legal Risk Exposure

Why It Matters:

Knowing who holds the private keys—or has the authority to move assets—is crucial. Unlicensed control of third-party assets could expose your business to regulatory violations and reputational harm.

Risks of Not Knowing:

  • Violation of licensing laws
  • Misalignment of risk responsibility
  • Unidentified counterparty exposure

What to Ask:

  • Who holds the controlling key material?
  • Is the custodian licensed in your jurisdiction?
  • Are key responsibilities clearly defined in contracts?


2. Operational Resiliency & Cybersecurity

Why It Matters:

The wallet provider’s ability to operate securely under stress—whether cyberattacks or outages—directly impacts your access to funds and customer experience.

Risks of Weak Resiliency:

  • Asset lockouts during outages
  • Exploits from insider threats or hackers
  • System-wide operational disruptions

What to Ask:

  • Does the provider have independent certifications (e.g., ISO, SOC)?
  • Are operational controls audited regularly?
  • What recovery mechanisms are in place for key loss or service failure?


3. Counterparty Risk, Continuity & Asset Recovery

Why It Matters:

From insolvency to technical failures, businesses need assurance that assets can be recovered in extreme situations.

Risks from Real-World Cases:

  • FTX: Custody confusion led to massive user losses.
  • Celsius: Lawful insolvency delayed or denied asset recovery.
  • Hacks: Weak wallet systems increase theft risk.

What to Ask:

  • Does the provider offer credible asset transfer and recovery plans?
  • Are controls in place to prevent misappropriation?
  • Is there a tested business continuity plan in place?


Conclusion: Choosing the Right Custody Path

Selecting a digital asset wallet solution is not just about functionality—it’s about trust, control, and risk management. Whether you’re leaning toward a self-custodial MPC wallet or a subcustodial provider, be sure to evaluate:

  • Who holds the keys
  • How well they mitigate operational risk
  • What happens in case of disaster

At Cregis, we help businesses design secure, scalable wallet strategies across the custody spectrum—from MPC self-custody to cloud-based subcustody solutions. Our architecture puts security and compliance at the center of your wallet infrastructure.

关于Cregis

Cregis成立于2017年,是企业级数字资产基础设施领域的全球领导者,为机构客户提供安全、可扩展且高效的管理解决方案。

为应对区块链系统碎片化和资产安全风险方面的挑战,Cregis提供基于MPC的自托管钱包、WaaS解决方案和支付引擎,打造高度整合且合规的数字资产管理平台和生态。

迄今为止,Cregis已为全球超过3,500家机构客户提供服务。为交易所、金融科技平台和Web3企业提供了安全的区块链技术接入方案。凭借多年在区块链和安全领域的成熟专业知识,Cregis助力企业加速Web3转型,把握全球数字资产发展机遇。